Spyware Developer Disguised As Facebook To Help Customers

✨ Megiddo

✨ President ✨
Staff member
Joined
May 15, 2016
Messages
3,878
Likes
2,573
Points
1,730
The NSO Group, using malicious sites, infected Pegasus user devices.

ab9518c95d0ed15021cf1c9ae145b7e4.jpg


Israeli spyware developer NSO Group ran a web domain disguised as a Facebook security team site to trick users into clicking on malicious links and installing cell phone hacking software.

A former NSO Group employee provided Motherboard with the IP address of a server that was used to infect phones with Pegasus malware. Once on an infected device, Pegasus is able to collect credentials for access to the cloud services Google Drive, Facebook Messenger and iCloud. A spyware program can carry out all operations without "initiating two-factor authentication or displaying an unauthorized access notification."

According to the publication, this IP address was associated with 10 domains during 2015 and 2016. Some of them were designed to seem harmless to the user. For example, they are disguised as resources that supposedly allow you to unsubscribe from sending emails or text messages. Other domains pretended to be Facebook's security team site and FedEx package tracking resources.

At the end of 2016, MarkMonitor, a search engine for malicious domains, acquired a site disguised as Facebook and, two months later, transferred control to Facebook so that attackers could not abuse it.
__________________
 

Valid Market Statistics

Threads
13,748
Messages
27,181
Members
51,471
Latest member
youbitch
Top Bottom